icon file copyright

Digital Rights Management (DRM) / Information Rights Management (IRM)

Digital rights management (DRM), sometimes referred to as information rights management (IRM), is critical for secure file sharing, access and storage.

Vaultize takes an information-centric approach to enterprise file security by ensuring that corporate information and data always stays under IT’s control.

Vaultize achieves this through its U.S. patent-pending micro-containerization technology that encrypts data at source and embeds rights management (DRM / IRM) within files themselves independent of file format. The files stored in designated folders / places or shared across the corporate fence are DRM-protected and only usable by authorized recipients within an authorized environment, even after they have been downloaded on a device not in IT’s control.

icon globe grey

Benefits of Vaultize DRM

  • Ensure corporate files are secure and manageable wherever they are stored (endpoints, servers or cloud) and wherever they go (even outside the corporate network)
  • Control enterprise files even after they’ve been sent out, e.g. triggering expiry of a file shared a month ago, pausing access to files
  • Fully integrated with Vaultize's industry-leading data compliance and protection capabilities, e.g. data retention management, version management, data deletion
  • Improve internal & external compliance and policy adherence
  • Easy to use without sacrificing security
  • Keep data secure in the event of an accidental internal leakage
icon people connection

Vaultize’s DRM / IRM Capabilities Include:

  • Access rights: Provides control over who can view, edit, print, copy/paste, screenshot, forward and download the documents or the information contained in them.
  • Location control: Provides control over geo-locations and IP ranges from where the recipient can access the shared data.
  • Expiration parameters: Document owner can set automatic expiration on the DRM-protected data. The expiration parameter can also be controlled by corporate IT through DRM policies.
  • Password requirements: Passwords and multi-factor authentication (e.g. one time passwords) can be mandated through predefined corporate policy or by the document owner. The recipient will be required to authenticate at the time of opening and/or downloading, as well as after the documents have been downloaded, ensuring that the documents are usable only by authorized users.
  • Revocation rights: At any time, IT or owner can remotely revoke the permissions/rights for accessing the shared documents, even after a recipient downloads the files on his or her own device.
  • Secure Folders: Protect designated folders on endpoints or file servers using DRM policies. Any files added or created inside a Secure Folder are automatically protected using Vaultize DRM and continue to be protected throughout their lifecycle.
  • Easy to use: It's easy to secure files / folders using Vaultize DRM - right-click, choose a DRM policy and done! IT teams can also use the powerful admin console to enforce policies on folders / files. For recipients also, the experience is seamless as DRM-protected files can open in any web browser if the native app is not installed.
  • Content protection on mobile devices: Based on the mobile content management (MCM) policy, the documents can be restricted to view-only access on mobile devices (iOS and Android) or restricted to controlled editing using a built-in editor for Microsoft Office and PDF annotation by controlling copying/pasting, printing and moving to other mobile apps.
  • Email attachment protection: The Vaultize Outlook & Notes plug-ins can be used to automatically replace email attachments with DRM-protected links. This replacement can be controlled by IT using policies based on attachment size, recipient domains, etc.
  • DLP connector (with classification support): Sensitive documents can be automatically DRM-protected before being downloaded by scanning and classifying them through any popular content-aware DLP solution.
  • Secure online document viewer: The viewing of shared documents by third parties can be restricted to read-only access through a secure web-based online document viewer, with full IT control on printing, copy/paste and screenshots.
  • Digital watermarking: With the online document viewer, watermarks (such as logo or copyright texts) can be added to each page of the document to discourage printing, screen capture or camera capture. This watermarking has options for embedding text, images or emails from the share link recipient.
  • Control over file types: Micro-containerization allows control over all types of files, including fine-grained controls over Microsoft Office, PDF, text, CSV and CAD documents.
  • Complete file tracking, audit & reporting: File usage is completely tracked such that an audit trail of activities — including opening, sharing, viewing, editing, forwarding and printing, user name, domain, machine name, IP address, geo-location — is maintained.
Report: A Buyer’s Guide To Enterprise Digital Rights Management (DRM): 6 Essentials To Consider Read It Now